A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin

被引:8
|
作者
Wang, Kai [1 ]
Pang, Jun [2 ]
Chen, Dingjie [3 ]
Zhao, Yu [3 ]
Huang, Dapeng [1 ]
Chen, Chen [3 ]
Han, Weili [3 ]
机构
[1] Fudan Univ, Sch Comp Sci, 2005 Songhu Rd, Shanghai 200438, Peoples R China
[2] Univ Luxembourg, Dept Comp Sci, 6 Ave Fonte, L-4364 Esch Sur Alzette, Luxembourg
[3] Fudan Univ, Software Sch, 2005 Songhu Rd, Shanghai 200438, Peoples R China
基金
国家重点研发计划; 中国博士后科学基金;
关键词
Bitcoin transactions; clustering; ransomware; VICTIMIZATION; OVERLAP;
D O I
10.1145/3494557
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Exploiting the anonymous mechanism of Bitcoin, ransomware activities demanding ransom in bitcoins have become rampant in recent years. Several existing studies quantify the impact of ransomware activities, mostly focusing on the amount of ransom. However, victims' reactions in Bitcoin that can well reflect the impact of ransomware activities are somehow largely neglected. Besides, existing studies track ransom transfers at the Bitcoin address level, making it difficult for them to uncover the patterns of ransom transfers from a macro perspective beyond Bitcoin addresses. In this article, we conduct a large-scale analysis of ransom payments, ransom transfers, and victim migrations in Bitcoin from 2012 to 2021. First, we develop a fine-grained address clustering method to cluster Bitcoin addresses into users, which enables us to identify more addresses controlled by ransomware criminals. Second, motivated by the fact that Bitcoin activities and their participants already formed stable industries, such as Darknet and Miner, we train a multi-label classification model to identify the industry identifiers of users. Third, we identify ransom payment transactions and then quantify the amount of ransom and the number of victims in 63 ransomware activities. Finally, after we analyze the trajectories of ransom transferred across different industries and track victims' migrations across industries, we find out that to obscure the purposes of their transfer trajectories, most ransomware criminals (e.g., operators of Locky and Wannacry) prefer to spread ransom into multiple industries instead of utilizing the services of Bitcoin mixers. Compared with other industries, Investment is highly resilient to ransomware activities in the sense that the number of users in Investment remains relatively stable. Moreover, we also observe that a few victims become active in the Darknet after paying ransom. Our findings in this work can help authorities deeply understand ransomware activities in Bitcoin. While our study focuses on ransomware, our methods are potentially applicable to other cybercriminal activities that have similarly adopted bitcoins as their payments.
引用
下载
收藏
页数:29
相关论文
共 50 条
  • [31] Large-scale tolerance analysis
    Fimmel, D
    Quitzk, S
    Schwarz, W
    INTERNATIONAL CONFERENCE ON PARALLEL COMPUTING IN ELECTRICAL ENGINEERING, 2004, : 33 - 38
  • [32] Large-scale lexical analysis
    Thurmair, Gr.
    Aleksic, V.
    Schwarz, Chr.
    LREC 2012 - EIGHTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2012, : 2849 - 2855
  • [33] An Empirical Mixture Model for Large-Scale RTT Measurements
    Fontugne, Romain
    Mazel, Johan
    Fukuda, Kensuke
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [34] A Large-Scale Empirical Study of Android App Decompilation
    Mauthe, Noah
    Kargen, Ulf
    Shahmehri, Nahid
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 400 - 410
  • [35] Empirical evidence of reliability growth in large-scale networks
    Univ of Pittsburgh, Pittsburgh, United States
    J Network Syst Manage, 2 (197-213):
  • [36] A large-scale empirical investigation of specialization in criminal career
    Heiler, Georg
    Pham, Tuan
    Korbel, Jan
    Wachs, Johannes
    Thurner, Stefan
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [37] Empirical Evidence of Reliability Growth in Large-Scale Networks
    Snow A.P.
    Weiss M.B.H.
    Journal of Network and Systems Management, 1997, 5 (2) : 197 - 213
  • [38] Quantifying reuse in OSS: A large-scale empirical study
    Constantinou, Eleni
    Ampatzoglou, Apostolos
    Stamelos, Ioannis
    International Journal of Open Source Software and Processes, 2014, 5 (03) : 1 - 19
  • [39] Empirical Bayes Estimates for Large-Scale Prediction Problems
    Efron, Bradley
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2009, 104 (487) : 1015 - 1028
  • [40] A Large-Scale Empirical Study of Geotagging Behavior on Twitter
    Huang, Binxuan
    Carley, Kathleen M.
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, : 365 - 373